Sciweavers

265 search results - page 50 / 53
» Security Patterns for Voice over IP Networks
Sort
View
PET
2007
Springer
15 years 3 months ago
Identity Trail: Covert Surveillance Using DNS
Abstract. The Domain Name System (DNS) is the only globally deployed Internet service that provides user-friendly naming for Internet hosts. It was originally designed to return th...
Saikat Guha, Paul Francis
WORM
2004
14 years 10 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
IMC
2007
ACM
14 years 11 months ago
A brief history of scanning
Incessant scanning of hosts by attackers looking for vulnerable servers has become a fact of Internet life. In this paper we present an initial study of the scanning activity obse...
Mark Allman, Vern Paxson, Jeff Terrell
KDD
2012
ACM
200views Data Mining» more  KDD 2012»
12 years 12 months ago
Vertex neighborhoods, low conductance cuts, and good seeds for local community methods
The communities of a social network are sets of vertices with more connections inside the set than outside. We theoretically demonstrate that two commonly observed properties of s...
David F. Gleich, C. Seshadhri
ICNP
2009
IEEE
14 years 7 months ago
DirCast: A Practical and Efficient Wi-Fi Multicast System
Abstract--IP multicast applications such as live lecture broadcasts are being increasingly used in enterprise and campus networks. In many cases, end hosts access these multicast s...
Ranveer Chandra, Sandeep Karanth, Thomas Moscibrod...